This page was not yet optimized for use on mobile devices.
Comparing certificates Experimental feature
You are comparing two certificates. By default, only differing attributes are shown. Use the button below to show/hide all attributes.
VERA Type-II SSR Application Firmware v1.5.2 21.0.03/TSE-CCCS-137 |
Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4 ISCB-5-RPT-C124-CR-v1 |
|
---|---|---|
name | VERA Type-II SSR Application Firmware v1.5.2 | Archer Suite v6.9.1.2 with the Archer IRM Mobile V1.4 |
category | ICs, Smart Cards and Smart Card-Related Devices and Systems | Other Devices and Systems |
scheme | TR | MY |
not_valid_after | 09.12.2027 | 17.05.2027 |
not_valid_before | 09.12.2022 | 17.05.2022 |
cert_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/CC%20Certificate.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-CERT-C124-CERTIFICATE-v1.pdf |
report_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/MT-VERA%20Certification%20Report.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/ISCB-5-RPT-C124-CR-v1.pdf |
st_link | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/VERA%20MTK200%20KEC_ST%20v2.2.pdf | https://www.commoncriteriaportal.org/nfs/ccpfiles/files/epfiles/Archer%20Suite%20v6.9.1.2%20with%20the%20Archer%20IRM%20Mobile%20V1.4%20_ST_v1.0-final.pdf |
manufacturer | MT BİLGİ TEKNOLOJİLERİ VE DIŞ TİC.A.Ş. | RSA Security LLC |
manufacturer_web | https://mtholding.com.tr/ | https://rsa.com |
security_level | EAL4+, ALC_DVS.2 | EAL2+, ALC_FLR.2 |
dgst | a23b2722122de369 | 0f38dd1ae9d80dfa |
heuristics/cert_id | 21.0.03/TSE-CCCS-137 | ISCB-5-RPT-C124-CR-v1 |
heuristics/cpe_matches | {} | cpe:2.3:a:rsa:archer:6.9:*:*:*:*:*:*:* |
heuristics/related_cves | {} | CVE-2022-30585, CVE-2021-29252, CVE-2021-41594, CVE-2022-37317, CVE-2021-33616, CVE-2022-26949, CVE-2021-29253, CVE-2020-29538, CVE-2021-33615, CVE-2022-26951, CVE-2020-26884, CVE-2022-30584, CVE-2021-38362, CVE-2020-29535, CVE-2022-26947, CVE-2022-26948, CVE-2022-26950, CVE-2022-37316 |
heuristics/extracted_sars | ASE_INT.1, ALC_DVS.2, ALC_CMC.4, ASE_ECD.1, ADV_IMP.1, ATE_COV.2, ASE_TSS.1, ALC_TAT.1, ASE_SPD.1, AVA_VAN.5, ALC_DEL.1, ALC_LCD.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.4, ATE_FUN.1, ADV_ARC.1, ASE_OBJ.2, ADV_TDS.3, ATE_DPT.1, ASE_REQ.2, ADV_FSP.4, ATE_IND.2, ASE_CCL.1 | ASE_INT.1, AVA_VAN.2, ADV_FSP.2, ASE_ECD.1, ASE_TSS.1, ASE_SPD.1, ALC_DEL.1, AGD_OPE.1, AGD_PRE.1, ALC_CMS.2, ADV_TDS.1, ATE_FUN.1, ATE_COV.1, ADV_ARC.1, ASE_OBJ.2, ALC_FLR.2, ASE_REQ.2, ALC_CMC.2, ATE_IND.2, ASE_CCL.1 |
heuristics/extracted_versions | 1.5.2 | 6.9.1.2, 1.4 |
maintenance_updates |
|
|
pdf_data/cert_filename | CC Certificate.pdf | ISCB-5-CERT-C124-CERTIFICATE-v1.pdf |
pdf_data/cert_keywords/cc_security_level |
|
|
pdf_data/cert_keywords/cc_sar |
|
|
pdf_data/cert_keywords/cc_claims |
|
|
pdf_data/cert_keywords/vendor |
|
|
pdf_data/cert_keywords/eval_facility |
|
|
pdf_data/cert_keywords/standard_id |
|
|
pdf_data/cert_metadata |
|